1 of 2
Danger level 8
Type: Rogue Anti-Spyware
Common infection symptoms:
  • Block exe files from running
  • Installs itself without permissions
  • Connects to the internet without permission
  • Shows commercial adverts
  • Slow internet connection
  • System crashes
  • Annoying Pop-up's
  • Slow Computer

Windows Antivirus Suite

If you must download and install a reliable antivirus tool, Windows Antivirus Suite is definitely not something you can trust. It is a rogue antispyware application which means that the program is a dangerous computer infection that only pretends it is a reliable computer security tool. A few years ago, users would often be fooled into thinking that the likes of Windows Antivirus Suite are reliable computer security programs. However, now everyone can clearly see that one must remove Windows Antivirus Suite from the computer as soon as possible, because the infection is very intrusive and extremely annoying.

The most annoying thing about Windows Antivirus Suite is that it successfully paralyzes your system. The same behavior is exhibited by other applications from the same Rogue.FakeVimes family, including Windows AntiBreach Help, Windows AntiBreachTool, Windows Paramount Protection and others. There has been an onslaught of these fake antivirus programs lately, and all of them have been created to enter your system surreptitiously and then extort your hard-earned money from you.

Windows Antivirus Suite generally gets installed via fake online malware scanners or spam email attachments. It is also very likely that your computer has been infected with a Trojan or any other type of malware prior to Windows Antivirus Suite entering the system. Computer infections often come in packs, so the best way to protect yourself from such threats is to avoid browsing unfamiliar and unreliable websites, and run regular system scans with licensed computer security applications.

When this rogue is installed on your computer, it is configured to run automatically each time your system boots up. In fact, once the setup is complete, Windows Antivirus Suite restarts your PC, and when the system loads, it launches a fake system scan that detects such “infections” as Trojan-ArcBom, P2P-Worm.Win32 or Trojan-Spy and many others. To make the matters worse, Windows Antivirus Suite also denies Internet access and even blocks explorer.exe which does not allow you to access your Start menu or any of your files anymore.

All of that is done in order to push you into spending your money for nothing. Even if a user knows that Windows Antivirus Suite is a malicious computer infection, he/she may end up spending the money out of pure helplessness. Nevertheless, paying your money to these cyber criminals is definitely not an option. You can cancel out of the infection symptoms TEMPORARILY by activating Windows Antivirus Suite with one of the following activation keys:

0W000-000B0-00T00-E0001
0W000-000B0-00T00-E0002
0W000-000B0-00T00-E0003
0W000-000B0-00T00-E0011
0W000-000B0-00T00-E0022
0W000-000B0-00T00-E0023
0W000-000B0-00T00-E0031
0W000-000B0-00T00-E0032
0W000-000B0-00T00-E0033

Once the rogue is “registered”, it will give you time to get yourself a reliable computer security tool that will help you remove Windows Antivirus Suite automatically. Do not wait for too long, because the activation effect can expire any time. You can also restore Windows Explorer by following the instructions we have provided below. Whichever way you to choose to terminate Windows Antivirus Suite, do all you can to make sure that the rogue does not regenerate. Acquire a reliable computer security application that will ensure your PC is safeguarded against similar infections.

Restore Windows Explorer

  1. Reboot the PC and tap F8 repeatedly once BIOS screen disappears.
  2. Select Safe Mode with Command Prompt and press Enter.
  3. When system loads, you will Command Prompt on your screen.
  4. Type cd.. after C:\Windows\system32 and press Enter.
  5. Type explorer.exe after C:\Windows in the newly appeared line and press Enter once more.
  6. Open Start menu and enter %appdata% into search box. Press Enter. For Windows XP, launch Run, enter %appdata% into Open box and click OK.
  7. Remove the file svc-[random symbols].exe from the directory.
  8. Reboot the system in Normal Mode.
  9. Open Start menu and type regedit into the Search box. Press Enter. For Windows XP, open Run, enter regedit into Open box and click OK.
  10. Navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows NT\Current Version\Winlogon.
  11. Right-click Shell on the right pane, and choose Modify.
  12. Enter %WinDir%\Explorer.exe into as Value and press OK.
  13. Access http://www.pcthreat.com/download-sph and download SpyHunter.
  14. Install the program and run a full system scan.
Download Spyware Removal Tool to Remove* Windows Antivirus Suite
  • Quick & tested solution for Windows Antivirus Suite removal.
  • 100% Free Scan for Windows
disclaimer

How to manually remove Windows Antivirus Suite

Files associated with Windows Antivirus Suite infection:

%AppData%\svc-[random file name].exe
%AppData%\data.sec

Windows Antivirus Suite processes to kill:

%AppData%\svc-[random file name].exe

Remove Windows Antivirus Suite registry entries:

HKEY_CURRENT_USER\Software\Microsoft\Windows\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\k9filter.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpUXSrv.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MSASCui.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msconfig.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msmpeng.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SPP
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\bckd "ImagePath" = "123123.sys"
Disclaimer

Post comment — WE NEED YOUR OPINION!

Comment:
Name:
Please enter security code:
This is a captcha-picture. It is used to prevent mass-access by robots.